skip to main content
10.1145/3437120.3437266acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

Comparison of VNE heuristic solutions with similar objective functions

Published:04 March 2021Publication History

ABSTRACT

Virtualization poses as the unavoidable catalyst for the integral restructuring of the future Internet. A considerable amount of techniques that embed virtual demands over physical resources in an optimal way, have already been proposed. The majority of these suggested strategies have adopted heuristic algorithms to generate acceptable, near optimal results in an affordable execution time. In this paper, we portray the importance of heuristic algorithms in the context of virtualization embedding processes and we thoroughly compare two of the most distinctive virtual mapping methodologies with similar objective functions that utilize heuristic algorithms to solve embedding scenarios. Our study confirms that the one stage scenario proves to produce more concrete results overall whereas the two-stage one constitutes a trustworthy option for better virtual resource distribution.

References

  1. 2020.Alevin2 - Tool for the evaluation of Algorithms for Embedding VIrtual Networks. https://sourceforge.net/p/alevin/wiki/home/Google ScholarGoogle Scholar
  2. Federico Alvarez 2019. An edge-to-cloud virtualized multimedia service platform for 5G networks. IEEE Transactions on Broadcasting65, 2(2019), 369–380.Google ScholarGoogle ScholarCross RefCross Ref
  3. Edoardo Amaldi, Stefano Coniglio, Arie MCA Koster, and Martin Tieves. 2016. On the computational complexity of the virtual network embedding problem. Electronic Notes in Discrete Mathematics52 (2016), 213–220.Google ScholarGoogle Scholar
  4. Paul Barham 2003. Xen and the art of virtualization. ACM SIGOPS operating systems review37, 5 (2003), 164–177.Google ScholarGoogle Scholar
  5. Sushil Bhardwaj, Leena Jain, and Sandeep Jain. 2010. Cloud computing: A study of infrastructure as a service (IAAS).International Journal of engineering and information Technology2, 1 (2010), 60–63.Google ScholarGoogle Scholar
  6. Haotong Cao, Han Hu, Zhicheng Qu, and Longxiang Yang. 2018. Heuristic solutions of virtual network embedding: A survey. China Communications15, 3 (2018), 186–219.Google ScholarGoogle ScholarCross RefCross Ref
  7. Giuseppa Caruso, Francesco Nucci, Oscar Prieto Gordo, Stamatia Rizou, Jacques Magen, George Agapiou, and Panagiotis Trakadas. 2019. Embedding5G solutions enabling new business scenarios in Media and Entertainment Industry. In2019 IEEE 2nd 5G World Forum (5GWF). IEEE, 460–464.Google ScholarGoogle Scholar
  8. NM Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, and Raouf Boutaba. 2009. Virtual network embedding with coordinated node and link mapping. InIEEE INFOCOM 2009. IEEE, 783–791.Google ScholarGoogle Scholar
  9. Ilhem Fajjari, Nadjib Aitsaadi, Guy Pujolle, and Hubert Zimmermann. 2011. Vnr algorithm: A greedy approach for virtual networks reconfigurations.In2011 IEEE Global Telecommunications Conference-GLOBECOM 2011. IEEE, 1–6.Google ScholarGoogle Scholar
  10. Andreas Fischer, Juan Felipe Botero, Michael Till Beck, Hermann De Meer, and Xavier Hesselbach. 2013. Virtual network embedding: A survey. IEEE Communications Surveys & Tutorials15, 4 (2013), 1888–1906.Google ScholarGoogle Scholar
  11. Jens Lischka and Holger Karl. 2009. A virtual network mapping algorithm based on subgraph isomorphism detection. In Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures. 81–88.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Manuel Peuster, Stefan Schneider, Mengxuan Zhao, George Xilouris, Panagiotis Trakadas, Felipe Vicens, Wouter Tavernier, Thomas Soenen, RicardVilalta, George Andreou, 2019. Introducing automated verification and validation for virtualized network functions and services. IEEE Communications Magazine57, 5 (2019), 96–102.Google ScholarGoogle ScholarCross RefCross Ref
  13. Stelios Prekas, Panagiotis Karkazis, and Panagiotis Trakadas. 2020. Comparison of Embedding Objectives for Next Generation Networks. In The Fifteenth International Multi-Conference on Computing in the Global Information Technology (Porto, Portugal, October 2020). XPS.Google ScholarGoogle Scholar
  14. Stamatia Rizou, Panagiotis Athanasoulis, Pasquale Andriani, Francesco Iadanza, Panagiotis Trakadas, David Griffin, Morteza Kheirkhah, DavidBreitgand, Avi Weit, Refik Fatih Ustok, 2020. Programmable Edge-to-Cloud Virtualization for 5G Media Industry: The 5G-MEDIA Approach. In IFIP International Conference on Artificial Intelligence Applications and Innovations. Springer, 95–104.Google ScholarGoogle ScholarCross RefCross Ref
  15. Alexander Schrijver. 1998.Theory of linear and integer programming. John Wiley & Sons.Google ScholarGoogle Scholar
  16. Thomas Soenen, Steven Van Rossem, Wouter Tavernier, Felipe Vicens, Dario Valocchi, Panos Trakadas, Panos Karkazis, George Xilouris, PhilipEardley, Stavros Kolometsos, 2018. Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodology. In NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, 1–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Panagiotis Trakadas 2020. Comparison of Management and Orchestration Solutions for the 5G Era. Journal of Sensor and Actuator Networks9,1 (2020), 4.Google ScholarGoogle ScholarCross RefCross Ref
  18. Panagiotis Trakadas, Nikolaos Nomikos, Emmanouel T Michailidis, Theodore Zahariadis, Federico M Facca, David Breitgand, Stamatia Rizou, XaviMasip, and Panagiotis Gkonis. 2019. Hybrid clouds for data-Intensive, 5G-Enabled IoT applications: an overview, key issues and relevant architecture.Sensors19, 16 (2019), 3591.Google ScholarGoogle Scholar
  19. Kurt Tutschku, Thomas Zinner, Akihiro Nakao, and Phuoc Tran-Gia. 2009. Network virtualization: Implementation steps towards the future internet. Electronic Communications of the EASST17 (2009), 14. https://doi.org/10.14279/tuj.eceasst.17.216Google ScholarGoogle Scholar
  20. Minlan Yu, Yung Yi, Jennifer Rexford, and Mung Chiang. 2008. Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Computer Communication Review38, 2 (2008), 17–29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Anastasios Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, Panagiotis Gouvas, Daniel Behnke, Marcel Müller, Patrick-BenjaminBök, Panagiotis Trakadas, Panagiotis Karkazis, 2020. Benchmarking and Profiling 5G Verticals’ Applications: An Industrial IoT Use Case. In2020 6th IEEE Conference on Network Softwarization (NetSoft). IEEE, 310–318.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    PCI '20: Proceedings of the 24th Pan-Hellenic Conference on Informatics
    November 2020
    433 pages

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 March 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate190of390submissions,49%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format